Device Management
Endpoint Detection & Response
Vulnerability Management
Kai
Liftoff
Prism
Migration Agent
Auto Apps
Passport
Compliance
Assignment Maps
Managed OS
Integrations
Mac
iPhone and iPad
Apple TV
Vision Pro
Financial Services
Technology
Artificial Intelligence
Marketing Agencies
Startup
Growth
Enterprise
Resources Hub
Kandji Blog
Customer Stories
Mac Admins Community
Security Details
MDM Comparison Guide
About Apple Device Management
Customer Support
Product Updates
Kandji Status
Customer Login
Register a Deal
Become a Partner
Technology Partners
Partner Portal
About Kandji
News & Press
Careers
Contact
Why Kandji?
Advanced MDM solution for Apple devices
Extensive threat detection and response for Mac
Find and fix software vulnerabilities on Mac
Device insights with AI
User onboarding
Pre-built device reports
MDM migration for Mac
App management
Synced passwords for Mac
Security control templates
Configuration management
Automated OS updates
Connect to your tools
Automate Mac security and management
Configure and secure mobile devices
Keep Apple TV up-to-date and managed
Use Vision devices with security and control
Shadow IT in Practice: How 100+ IT Professionals Adapt, Respond, and Redefine Control
Shadow IT has always been a loaded term, typically implying rule-breaking, risk, or lack of control. But the reality is more nuanced. When we surveyed 115 IT professionals, what we found wasn’t a story of defiance. It was one of friction.
Streamline MDM Migration with the Kandji Migration Agent
Kandji's recent Demo Day focused on the Kandji Migration Agent, a powerful tool designed to streamline the process of moving Mac computers from existing MDM solutions to Kandji. In this article, we'll review topics covered in the Demo Day, including why migration has traditionally been challenging, how the Migration Agent works, and best practices for a successful migration. At the close, we'll highlight questions and answers from our expert team provided during the live Q&A.
Dissecting the macOS 'AppleProcessHub' Stealer: Technical Analysis of a Multi-Stage Attack
On May 15, 2025, the security research team MalwareHunterTeam (@malwrhunterteam) identified a suspicious file named libsystd.dylib with low detection—only 2 at the time of posting— which appeared to be an infostealer. On macOS, infostealers collect private information such as keychain passwords and cryptocurrency wallets, which are then uploaded to an attacker-controlled server. This particular infostealer is designed to exfiltrate user files including bash history, zsh history, GitHub configurations, SSH information, and the Keychain. A Threat Actor may leverage this information to find IP addresses, hostnames, domain names, or paths to internal resources. This could evolve the threat from an exposure of the individual, to an infiltration of their organization.
Visit the Knowledge Base to access help documentation
Latest feature releases and product updates
Stay updated on Kandji system status
Learn about Kandji, the Apple endpoint security platform
Read the latest news covering Kandji's innovations
Browse open job opportunities at Kandji
Get in touch with the Kandji team
Register a partner opportunity with Kandji for collaboration.
Apply to join the Kandji Partner Program
Check out Kandji’s integrations & API
Log in to access Kandji Partner Academy
Kandji's focus on automation sets it apart from any other MDM solution on the market.